In today scenario the wireless network systems are widely used in the industries. Due to its higher growth the threads involved in the wireless network also increases. So there is a need to provide security for the network systems. This can be obtained by following the rules and regulations. This phenomenon was known as wireless security. Here we are going to see about the problem faced by the automobile company on their network system deployment. The wireless network system was the most flexible as well as effective network system. But it has major flaws in its configurations. When compared to wired connection there is no physical control of the users. Here the user access are controlled by the authentication process. Wireless systems also reduce the initial costs. So the drawbacks like authentication problems must to be rectified. That is the only way to make the sustainable systems. The authentication process will be controlled by securing the governing policies. Because the wireless network system there is a possibility to attacked by the attackers. Unless we protect the system by employing the clear authentication process. Here the SQL servers are used to scan the server database. That acts like the server management system.
Nowadays the computing system where becoming portable and smaller in size, so the devices has theft and the data are stolen. The stolen device has may store more data that can protected by security like encryption key. For security purpose the system gives solution as fingerprint recognition, scanning apply to mobile devices. For example the mobile device security improve many biometric security of HP IPAQ Pocket PC. The operating environments have needs for security at the levels of stages when incorporates by applications of security. The investigation have been done in this part. An example to block the file which are accessed by PDA device the system administrator need unblock the access files whether is the credentials are supplied improper. By severe loss of PDA operational have result in the part of environments, that are computerized in memory have wants to erase and disk data, by unsuccessful logins may leads to reset the hard disk. In wireless network system there is no physical security was available like the wired connection. In wired LAN connection the computers are connected by the wires as well as optical fiber cables. They provide the physical security for the data transferred by the computers. But wireless connectivity that uses some kind of waves they are capable of transmitting the data packets. So the wireless network connection authentication process must be very strong and not easily hackable. For this purpose there are many methods are used. But WEP, WPA, WPA 2.
The open network provides the free connection to use the network that leads to download and browse any information and there is no rules to use GPS devices for protection, In US rules the scanning of node is not illegal. But the information of the robbing service they can attack it [1]. By node scanning have to give the location and access point. The location privacy and access point have issued. In access point the common breaching are used as given below.
The access point were setting the duplicate to understand of the scanning in more than two attempts in one day. In Africa the member are trying to use the credit card of the other member there caught by theft of more credit card pin.
The ethical issues has cause the access of unauthorized data. For example In US a person has log on the computer by other person without any regulation by an open network. The data or network are accessed without any permission that may leads to robbing. Whether the network has access by unauthorized persons the administrator cannot use the bandwidth for long time. They wants to pay the money for the bandwidth compare to application that’s leads to gaming. For access the network, user can do anymore. In future the people are becoming the aware of network by this problems. For security the administrator are applying the passwords for each open network. But the now also hacking the internet access and they have many tools to recover the passwords and many website the help the hacker to hacks the passwords like remember password. The user are not configure the system if they don’t allot. The encryption keys have provide many high level security to the user. The authentication have provide mechanism in 802.11.
Shared key Authentication: This authentication has process the response to complete and challenge the access point.
Open system authentication: This authentication uses the SSID approach, the access can be granted whether it is SSID are not.
Centralized authentication: This authentication the server are used. The network can access only in authentication.
Here the physical configuration of the different floors of the office was showed.
Configuration for 1st Floor
Configuration for 2nd Floor
Configuration 3rd floor
Configuration of 4th floor
Above showed configuration diagram was drawn by the MS Visio software (Microsoft.com, 2016), here the created diagram was enclosed.
The developed design contains the information about the devices that are connected with the networks was showed [6] [7] [8].
The rational model represents the basic constructing blocks, divided by purpose, & the configuration [14].
IP Design
1 |
172.16.1.0 |
255.255.255.192 |
|
2 |
172.16.1.128 |
255.255.255.224 |
|
3 |
172.16.2.0 |
255.255.255.192 |
|
4 |
172.16.2.128 |
255.255.255.224 |
|
5 |
172.16.2.192 |
255.255.255.224 |
|
6 |
172.16.2.224 |
255.255.255.224 |
|
7 |
172.16.3.0 |
255.255.255.224 |
|
8 |
172.16.3.64 |
255.255.255.224 |
|
9 |
172.16.3.128 |
255.255.255.224 |
|
1 st floor |
48 port sw |
Switch Cisco 2960 |
|
2nd floor |
48 port sw |
Switch Cisco 2960 |
|
3 floor |
48 port sw |
||
4 floor |
24 port sw |
Netsim Work
Set off IP values are selected for guest users.
Table 1 IP table for Guest users
User Name |
IP Address |
Sub Net Mask |
Default Gateway |
Guest1 |
192.168.10.1 |
255.255.255.0 |
192.168.10.100 |
Guest2 |
192.168.10.2 |
255.255.255.0 |
192.168.10.100 |
Guest3 |
192.168.10.3 |
255.255.255.0 |
192.168.10.100 |
Guest4 |
192.168.10.4 |
255.255.255.0 |
192.168.10.100 |
Guest5 |
192.168.10.5 |
255.255.255.0 |
192.168.10.100 |
Guest6 |
192.168.10.6 |
255.255.255.0 |
192.168.10.100 |
Guest7 |
192.168.10.7 |
255.255.255.0 |
192.168.10.100 |
Guest8 |
192.168.10.8 |
255.255.255.0 |
192.168.10.100 |
Guest9 |
192.168.10.9 |
255.255.255.0 |
192.168.10.100 |
Guest10 |
192.168.10.10 |
255.255.255.0 |
192.168.10.100 |
IP Values for Guest users are showed in the above table.
Table 2 IP Table for Normal Users
User Name |
IP Address |
Sub Net Mask |
Default Gateway |
User1 |
192.168.10.11 |
255.255.255.0 |
192.168.10.100 |
User2 |
192.168.10.12 |
255.255.255.0 |
192.168.10.100 |
User3 |
192.168.10.13 |
255.255.255.0 |
192.168.10.100 |
User4 |
192.168.10.14 |
255.255.255.0 |
192.168.10.100 |
User5 |
192.168.10.15 |
255.255.255.0 |
192.168.10.100 |
User6 |
192.168.10.16 |
255.255.255.0 |
192.168.10.100 |
User7 |
192.168.10.17 |
255.255.255.0 |
192.168.10.100 |
User8 |
192.168.10.18 |
255.255.255.0 |
192.168.10.100 |
User9 |
192.168.10.19 |
255.255.255.0 |
192.168.10.100 |
User10 |
192.168.10.20 |
255.255.255.0 |
192.168.10.100 |
User11 |
192.168.10.21 |
255.255.255.0 |
192.168.10.100 |
User12 |
192.168.10.22 |
255.255.255.0 |
192.168.10.100 |
User13 |
192.168.10.23 |
255.255.255.0 |
192.168.10.100 |
User14 |
192.168.10.24 |
255.255.255.0 |
192.168.10.100 |
User15 |
192.168.10.25 |
255.255.255.0 |
192.168.10.100 |
User16 |
192.168.10.26 |
255.255.255.0 |
192.168.10.100 |
User17 |
192.168.10.27 |
255.255.255.0 |
192.168.10.100 |
User18 |
192.168.10.28 |
255.255.255.0 |
192.168.10.100 |
User19 |
192.168.10.29 |
255.255.255.0 |
192.168.10.100 |
User20 |
192.168.10.30 |
255.255.255.0 |
192.168.10.100 |
User21 |
192.168.10.31 |
255.255.255.0 |
192.168.10.100 |
User22 |
192.168.10.32 |
255.255.255.0 |
192.168.10.100 |
User23 |
192.168.10.33 |
255.255.255.0 |
192.168.10.100 |
User24 |
192.168.10.34 |
255.255.255.0 |
192.168.10.100 |
User25 |
192.168.10.35 |
255.255.255.0 |
192.168.10.100 |
User26 |
192.168.10.36 |
255.255.255.0 |
192.168.10.100 |
User27 |
192.168.10.37 |
255.255.255.0 |
192.168.10.100 |
User28 |
192.168.10.38 |
255.255.255.0 |
192.168.10.100 |
User29 |
192.168.10.39 |
255.255.255.0 |
192.168.10.100 |
User30 |
192.168.10.40 |
255.255.255.0 |
192.168.10.100 |
User31 |
192.168.10.41 |
255.255.255.0 |
192.168.10.100 |
User32 |
192.168.10.42 |
255.255.255.0 |
192.168.10.100 |
User33 |
192.168.10.43 |
255.255.255.0 |
192.168.10.100 |
User34 |
192.168.10.44 |
255.255.255.0 |
192.168.10.100 |
User35 |
192.168.10.45 |
255.255.255.0 |
192.168.10.100 |
User36 |
192.168.10.46 |
255.255.255.0 |
192.168.10.100 |
User37 |
192.168.10.47 |
255.255.255.0 |
192.168.10.100 |
User38 |
192.168.10.48 |
255.255.255.0 |
192.168.10.100 |
User39 |
192.168.10.49 |
255.255.255.0 |
192.168.10.100 |
User40 |
192.168.10.50 |
255.255.255.0 |
192.168.10.100 |
IP Values for Normal users (Office use) are showed here.
Network topology diagram was the graphical representation of the network to be created [3] [7]. That was created with the help of network simulating software [13]. In this project NetSim software was used to create the design of the network and its configuration. Here we can also simulate the performance of the network [4]. Here the file created by the netsim software was enclosed here.
In Wi-Fi network system there are many types of security credentials are used. Here we are going to see about those kind of security protocols. Mainly WPA2 as well as RADIUS are used in wireless security system. Here we are going to see about those protocols.
WPA2
It is abbreviated as Wifi Protected Access-2. This is the advanced version of WPA. This is commonly used security system in wireless network system. From latter 2006 all the standard wifi devices are use these technology. This technology was used to encrypt the data packets. That provides security to the transmitted data. This technology provides higher security to the data transmitted through the wireless data. This available in two variants. Both techniques are same by the function by differentiated by the purpose. And they are WPA2 Personal, WPA2 Enterprise. It ensures the confidentiality of the network system. If we implemented those system there is no need to worry about the unauthorized users. Because that allows only the authorized users. It works based on the IEEE802.11i standards [10] [11][12]. This gives the highest protection against attackers by make the strong and secure authentication process. The WPA2 personal was used for protect the network system by setting the password. But WPA2 Enterprise was server based verification system.
It is abbreviated as Remote Authentication Dial In User Service. This technology was established by the Livingston-Enterprises [2] [4]. The main purpose of this technology was to provide security to the wireless network system by creating the strong authentication process. This technology was based on the RFC2866 standard. Here the authenticating process was carried out by this protocol. Each and every users are must register by the administrator. Here the user ID as well as the password was given to the users. If the user can’t give the correct username as well as the password. He can’t able to access the network system. The entered access ID was compared with already registered ID. If both ID matched the access permission was given to the user [9]. This also called as the client server protocol [5]. This technology uses the variety of methods to ensure the proper authentication process, and they are PAP, PPP etc.
Here the above described two security systems are implemented in the developed wireless network to ensure the safety of the system. Here we are going to see about the how to implement the two protocols.
WPA2
The implementation of the WPA2 system was basically done by the four stages. And they are explained below [3].
Stage 1 Checking pre – requirements
This the first stage of implementation. That is common for both methods. Here we need to check the pre requirements of the protocol and check the compatibility of the OS. Generally all the latest operating systems are compatible for this protocol. If we use the older software we need to use the support software like patching software, etc.
Stage 2 Check Wireless Adapter configurations.
Here the OS as well as the wireless adapter must compatible with this protocol. Unless we can’t use this security protocol. If the adapter was internally fixed with the system we need to install the supporting files.
Stage 3 Router configuration
Then the third step was configure the router. Here we need to check the compatibility of the router. All the latest routers are suited for implement this protocol.
The above showed figure shows the router configuration setting page. It was looks similar to the above showed image. But it changes with respect to the company.
Step 4. Finishing the configuration:
This is the last stage of the setup. Here we can able to see the active user details. But we need to keep the password confidentially.
In administrator system we need to do the following changes.
Step 1: Start -> Administrative-tools -> Internet Authentication
Step 2: Check the active directory register to ensure the RADIUS-server.
Step 3: Internet-Authentication-Service -> register server
Step 4: Radius client folder -> Add New-Client
Step 5: Fill the client details
Step 6: Press Next
Step 7: Additional-Information -> Client-Vendor-> Select RADIUS Standard -> Set password
Step 8: Press Finish.
Conclusion
At the end of the report the secured wireless network was created. Here the network system was protected by the WPA2 as well as RADIUS protocols. The logical network system was developed as well as simulated by using the netsim software. The different legal issues involved in the wireless network was analyzed. The security protocols are analyzed as well as the implemented in the wireless system.
References
[1]”Wireless”, Ethics.csc.ncsu.edu, 2018. [Online]. Available: https://ethics.csc.ncsu.edu/risks/security/wireless/study.php. [Accessed: 31- May- 2018].
[2]”Configuring RADIUS servers”, Technet.microsoft.com, 2018. [Online]. Available: https://technet.microsoft.com/en-us/library/cc995218.aspx. [Accessed: 31- May- 2018].
[3]D. Strom, “Tutorial: How to set up WPA2 on your wireless network”, Computerworld, 2018. [Online]. Available: https://www.computerworld.com/article/2547129/mobile-wireless/tutorial–how-to-set-up-wpa2-on-your-wireless-network.html. [Accessed: 31- May- 2018].
[4]E. Geier, “Low-cost RADIUS servers for Wi-Fi security”, Computerworld, 2018. [Online]. Available: https://www.computerworld.com/article/2492402/wireless-networking/low-cost-radius-servers-for-wi-fi-security.html. [Accessed: 31- May- 2018].
[5]F. Paul Funk, “The expanding role of the RADIUS server”, Computerworld, 2018. [Online]. Available: https://www.computerworld.com/article/2574976/security0/the-expanding-role-of-the-radius-server.html. [Accessed: 31- May- 2018].
[6]S. Categories, W. Videos, W. Gallery, 2. Locations, W. #WLPC?, L. Library, H. Works, E. Library, T. Conditions and P. Policy, “Wireless Design Principles and Best Practices | Wireless LAN Professionals”, Wireless LAN Professionals, 2018. [Online]. Available: https://www.wlanpros.com/resources/wireless-design-principles-best-practices/. [Accessed: 31- May- 2018].
[7]J. Abraham, “3 WLAN Design Best Practices Essential To Deliver a Better User Experience”, Securedgenetworks.com, 2018. [Online]. Available: https://www.securedgenetworks.com/blog/3-wlan-design-best-practices-essential-to-deliver-a-better-user-experience. [Accessed: 31- May- 2018].
[8]”WLAN Design Best Practices And Challenges”, Network Computing, 2018. [Online]. Available: https://www.networkcomputing.com/wireless-infrastructure/wlan-design-best-practices-and-challenges/49809405. [Accessed: 31- May- 2018].
[9]”RADIUS Protocol”, Docs.oracle.com, 2018. [Online]. Available: https://docs.oracle.com/cd/E70765_01/doc.113/e72005/rp_radius.htm#ICPRP168. [Accessed: 31- May- 2018].
[10]”KRACK Attacks: Breaking WPA2″, Krackattacks.com, 2018. [Online]. Available: https://www.krackattacks.com/. [Accessed: 31- May- 2018].
[11]”The Difference Between WEP, WPA, and WPA2 Wi-Fi Passwords”, Howtogeek.com, 2018. [Online]. Available: https://www.howtogeek.com/167783/htg-explains-the-difference-between-wep-wpa-and-wpa2-wireless-encryption-and-why-it-matters/. [Accessed: 31- May- 2018].
[12]”What you need to do about the WPA2 Wi-Fi network vulnerability”, Us.norton.com, 2018. [Online]. Available: https://us.norton.com/internetsecurity-emerging-threats-what-to-do-about-krack-vulnerability.html. [Accessed: 31- May- 2018].
[13]”Types of Network Topology in Computer Networks | Studytonight”, Studytonight.com, 2018. [Online]. Available: https://www.studytonight.com/computer-networks/network-topology-types. [Accessed: 31- May- 2018].
[14]”Types of Wireless Networks | Commotion Wireless”, Commotionwireless.net, 2018. [Online]. Available: https://commotionwireless.net/docs/cck/networking/types-of-wireless-networks/. [Accessed: 31- May- 2018].
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download